ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Freeform Dynamicsstart=20start=20start=10start=20start=20"

  • Executive Insights: Scoping out Sustainability

    Sponsored by: Schneider Electric

    In this e-book, take a deep dive into the importance of environmental responsibility in the data center, demystify Scope 3, and take a look at the sustainability software available today.

  • Computer Weekly – 11 February 2020: How the Post Office caused so much misery

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, after a landmark legal victory against the Post Office over a faulty IT system, campaigner Alan Bates shares his 20-year story of trials and triumph. Oracle is under fire over its cloud sales practices – we examine the claims. And we look at the sustainability challenges for datacentres.

  • Cloudflare Security Brief

    Sponsored by: Cloudflare

    Take a deep look at the most important trends shaping the cyber threat landscape today: AI, vulnerability exploitation, DDoS attacks, phishing, and Zero Trust. Based on the extensive data from Cloudflare’s cloud network, this security brief highlights key trends. Access the brief to learn more.

  • A Strategic Approach To Maintaining PCI DSS 4.0 Compliance

    Sponsored by: Cloudflare

    As PCI DSS 4.0 brings new compliance requirements, organizations need a streamlined approach to address them. This whitepaper outlines how Cloudflare's connectivity cloud can help you meet PCI DSS 4.0 with security, visibility, and automation. Read the full whitepaper to learn more.

  • Reinventing Backup and Recovery With AI and ML

    Sponsored by: Veeam Software

    To gain insight into these AI and ML trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and data professionals familiar with and/or responsible for data protection (including backup and recovery) decisions and data science for their organization. Read this exclusive ESG and Veeam eBook to find out more.

  • Beyond the GenAI Hype - Real World Investments Use Cases and Concerns

    Sponsored by: Enterprise Strategy Group

    As the generative AI (GenAI) market accelerates, your business, like every business, is pressured to keep up. To strengthen your understanding of the present state of GenAI – including challenge areas, use cases and budget strategies – review this report by TechTarget’s Enterprise Strategy Group (ESG).

  • Computer Weekly - 10 September 2024: The flight to data success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how Manchester Airport Group has set course to become the world's most intelligent airport through its data-led approach. We also look at failings of AI initiatives as the tech hits roadblocks, as well as take a peak at what support networks are available to those new in the CISO role. Read the issue now.

  • Remote’s Guide to Global Benefits

    Sponsored by: Remote

    All teams need the right talent to ensure success. However, finding that talent can be difficult, especially in the modern, remote era. But remote work does enable a positive factor: you can expand the pool from which you draw. Access this guide to learn more.

  • Computer Weekly – 3 September 2024: The politics of techno-refusal

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we learn about the politics of techno-refusal and what can be learned from the sabotage of tech infrastructure in the 1980s. Following the controversy around Broadcom's purchase of VMware, we examine alternative virtualisation solutions. And our latest buyer's guide looks at the state of SD-WAN. Read the issue now.

  • Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

    Sponsored by: TechTarget ComputerWeekly.com

    Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.